🚨 CMMC Phase One started November 10! Here's everything you need to know →

Step-by-Step Checklist to Implement FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII (Code 550): Sanitizing and Destroying FCI Media

A practical, step-by-step checklist to help small businesses sanitize and destroy Federal Contract Information (FCI) media to meet FAR 52.204-21 and CMMC 2.0 Level 1 requirements.

•
April 20, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

FAR 52.204-21 and CMMC 2.0 Level 1 (control MP.L1-B.1.VII, Code 550) require contractors to sanitize or destroy media containing Federal Contract Information (FCI) before disposal or reuse; this post gives a practical, step-by-step checklist tailored for small businesses to implement that requirement reliably, defensibly, and efficiently.

Implementation checklist — overview

Begin implementation by treating sanitization as a process, not a one-off task: inventory media, classify FCI-containing assets, establish policies and roles, select sanitization methods based on media type, verify and document outcomes, and maintain records (including certificates of destruction) for audit and contract compliance. The approach below follows the NIST SP 800-88 Rev. 1 model—Clear, Purge, Destroy—which aligns with both FAR and CMMC expectations.

1) Inventory and classification

Step 1: Build an asset inventory that explicitly tags media types that may contain FCI—laptops, desktops, removable USB drives, external HDD/SSDs, backup tapes, network-attached storage (NAS), printers/copiers with internal drives, mobile devices, and cloud storage. Use a simple spreadsheet or a lightweight inventory tool to capture owner, location, data classification (FCI or not), last use date, and retention/ disposition date. For small businesses, even a shared Google Sheet with controlled access is sufficient if you log changes and back it up.

2) Policy, roles, and procedures

Create a short written procedure that states: who is authorized to approve media disposal, how sanitization decisions are made (clear vs. purge vs. destroy), required verification steps, and how to document completion. Assign roles: Media Owner (usually the project lead), IT Executor (staff or vendor doing the sanitization), and Compliance Approver (person signing-off). Include basic employee guidance in onboarding—how to tag media for destruction and the process for returning devices at termination.

3) Choose correct sanitization methods and technical controls

Select methods by media type and follow NIST SP 800-88 guidance: For magnetic HDDs, "Clear" (overwrite with secure software) is often adequate for reuse; "Purge" (degaussing) or "Destroy" (physical shredding) for disposal. For SSDs and flash media, do not rely on simple overwrite—use vendor secure-erase commands (ATA Secure Erase via hdparm, NVMe Secure Erase/Format, or manufacturer tools) or cryptographic erase (destroying encryption keys) as the preferred purge methods; otherwise physically destroy. For mobile devices, encrypt the device (full-disk encryption or platform default) and then perform a factory reset and key destruction; where possible use MDM to trigger secure wipe. For cloud-hosted backups or SaaS, require proof of deletion or rely on provider APIs that support secure deletion and retention-policy enforcement. Always verify successful completion (see next section).

4) Practical small-business examples and scenarios

Example A — Returning laptop: Before redeploying a contractor laptop, IT checks the inventory tag, backs up non-FCI data, performs a full-disk wipe using a known tool (example: vendor secure-erase or a vetted disk-wiping utility that uses a single pass overwrite verified by the tool), reimages, and logs the serial number and wipe completion. Example B — Office copier: When replacing a multifunction printer, treat the internal storage as potential FCI; either remove the drive and physically destroy it or request the OEM perform and certify a secure purge; record the certificate of destruction. Example C — USB drives found in an office drawer: Quarantine, verify whether they hold FCI, and if so, physically destroy (shredding) or securely purge; do not reformat and reuse without documented verification. These lightweight, repeatable steps scale for small teams and can be integrated into routine offboarding and equipment refresh workflows.

5) Verification, records, and chain of custody

Verification is essential for compliance. For sanitized drives, maintain logs with media serial numbers, method used (software overwrite, ATA secure erase, physical destruction), date, executor, and a verification signature. For physical destruction, obtain a Certificate of Destruction (CoD) from the vendor that includes chain-of-custody details and method (shredding, crushing). For cryptographic erase, retain logs showing key destruction events and device IDs. Periodically audit a sample of sanitized media (e.g., attempt a forensic recovery on a sampling of sanitized devices using a third-party tool) to validate your processes—document these audits and any corrective actions.

6) Risks, compliance tips, and best practices

Failing to sanitize or destroy FCI can lead to data exposure, contract breaches, debarment risk, and reputational damage. Practical best practices: encrypt all devices at acquisition (this reduces risk and simplifies sanitization via crypto-erase), use vendor-provided secure erase tools for SSDs, include sanitization clauses in supplier and disposal contracts, label media slated for destruction and segregate it securely until processed, train staff on procedures (especially for copier returns and USB handling), and keep documented evidence for FAR/CMMC audits. Avoid outdated advice like multi-pass overwrites for SSDs—follow NIST SP 800-88 guidance that reflects modern storage technology.

Implementing MP.L1-B.1.VII (Code 550) is achievable for small businesses with disciplined inventory and lightweight procedures: encrypt by default, select the appropriate sanitization method per media type, verify and document all actions, and use certified destruction vendors when physically destroying media. These practical steps reduce risk, support contract compliance, and keep your organization audit-ready.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes